ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Code Reordering Obfuscation Technique Detection by Means of Weak Bisimulation
Advanced Information Networking and Applications - Advances in Intelligent Systems and Computing
◽
10.1007/978-3-030-44041-1_116
◽
2020
◽
pp. 1368-1382
Author(s):
Giuseppe Crincoli
◽
Tiziano Marinaro
◽
Fabio Martinelli
◽
Francesco Mercaldo
◽
Antonella Santone
Keyword(s):
Weak Bisimulation
◽
Obfuscation Technique
Download Full-text
Related Documents
Cited By
References
Structural modification based netlist obfuscation technique for PLDs
2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
◽
10.1109/wispnet.2016.7566370
◽
2016
◽
Author(s):
G. Sumathi
◽
L. Srivani
◽
D. Thirugnana Murthy
◽
Anish Kumar
◽
K. Madhusoodanan
◽
...
Keyword(s):
Structural Modification
◽
Obfuscation Technique
Download Full-text
Computing Strong/Weak Bisimulation Equivalences and Observation Congruence for Value-Passing Processes
Tools and Algorithms for the Construction and Analysis of Systems - Lecture Notes in Computer Science
◽
10.1007/3-540-49059-0_21
◽
1999
◽
pp. 300-314
◽
Cited By ~ 9
Author(s):
Zhoujun Li
◽
Huowang Chen
Keyword(s):
Weak Bisimulation
Download Full-text
Weak Bisimulation Up to Elaboration
CONCUR 2006 – Concurrency Theory - Lecture Notes in Computer Science
◽
10.1007/11817949_26
◽
2006
◽
pp. 390-405
◽
Cited By ~ 6
Author(s):
Damien Pous
Keyword(s):
Weak Bisimulation
Download Full-text
UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program
Software Practice and Experience
◽
10.1002/spe.2622
◽
2018
◽
Vol 48
(12)
◽
pp. 2331-2349
◽
Cited By ~ 6
Author(s):
Jae Hyuk Suk
◽
Jae-Yung Lee
◽
Hongjoo Jin
◽
In Seok Kim
◽
Dong Hoon Lee
Keyword(s):
Obfuscation Technique
◽
Technique Analysis
Download Full-text
Data Obfuscation Technique in Cloud Security
10.1109/icosec51865.2021.9591915
◽
2021
◽
Author(s):
Vamsidhar Enireddy
◽
K. Somasundaram
◽
P. C. Senthil Mahesh M
◽
M. Ramkumar Prabhu
◽
D. Vijendra Babu
◽
...
Keyword(s):
Cloud Security
◽
Data Obfuscation
◽
Obfuscation Technique
Download Full-text
A New VLSI Algorithm for type IV DCT for an Efficient Implementation of Obfuscation Technique
2020 43rd International Conference on Telecommunications and Signal Processing (TSP)
◽
10.1109/tsp49548.2020.9163537
◽
2020
◽
Author(s):
Laura-Teodora Cotorobai
◽
Doru Florin Chiper
Keyword(s):
Efficient Implementation
◽
Type Iv
◽
Obfuscation Technique
◽
Vlsi Algorithm
Download Full-text
A hardware obfuscation technique for manufacturing a secure 3D IC
2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS)
◽
10.1109/mwscas.2018.8624085
◽
2018
◽
Cited By ~ 3
Author(s):
Siroos Madani
◽
Mohammad R. Madani
◽
Indira Kalyan Dutta
◽
Yamini Joshi
◽
Magdy Bayoumi
Keyword(s):
3D Ic
◽
Obfuscation Technique
Download Full-text
A theory of weak bisimulation for core CML
ACM SIGPLAN Notices
◽
10.1145/232629.232649
◽
1996
◽
Vol 31
(6)
◽
pp. 201-212
◽
Cited By ~ 2
Author(s):
William Ferreira
◽
Matthew Hennessy
◽
Alan Jeffrey
Keyword(s):
Weak Bisimulation
Download Full-text
A code obfuscation technique to prevent reverse engineering
2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
◽
10.1109/wispnet.2017.8299877
◽
2017
◽
Cited By ~ 1
Author(s):
Asish Kumar Dalai
◽
Shakya Sundar Das
◽
Sanjay Kumar Jena
Keyword(s):
Reverse Engineering
◽
Code Obfuscation
◽
Obfuscation Technique
Download Full-text
New lightweight Anti-SAT block design and obfuscation technique to thwart removal attack
Integration
◽
10.1016/j.vlsi.2020.05.001
◽
2020
◽
Vol 75
◽
pp. 178-188
Author(s):
Vijaypal Singh Rathor
◽
Bharat Garg
◽
G.K. Sharma
Keyword(s):
Block Design
◽
Obfuscation Technique
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close